Node.js third-party module query-mysql versions 0.0.0, 0.0.1, and 0.0.2 are vulnerable to an SQL injection vulnerability due to lack of user input sanitization. This may allow an attacker to run arbitrary SQL queries when fetching data from database.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0448 | Node.js third-party module query-mysql versions 0.0.0, 0.0.1, and 0.0.2 are vulnerable to an SQL injection vulnerability due to lack of user input sanitization. This may allow an attacker to run arbitrary SQL queries when fetching data from database. |
Github GHSA |
GHSA-9mr8-6prp-gwjv | SQL Injection in query-mysql |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://hackerone.com/reports/311244 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T18:29:31.999Z
Reserved: 2017-12-28T00:00:00
Link: CVE-2018-3754
No data.
Status : Modified
Published: 2018-07-03T21:29:00.793
Modified: 2024-11-21T04:06:00.760
Link: CVE-2018-3754
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA